@@ -1655,11 +1655,7 @@ static int smack_inode_listsecurity(struct inode *inode, char *buffer,
16551655 */
16561656static void smack_inode_getlsmprop (struct inode * inode , struct lsm_prop * prop )
16571657{
1658- struct smack_known * skp = smk_of_inode (inode );
1659-
1660- prop -> smack .skp = skp ;
1661- /* scaffolding */
1662- prop -> scaffold .secid = skp -> smk_secid ;
1658+ prop -> smack .skp = smk_of_inode (inode );
16631659}
16641660
16651661/*
@@ -2162,8 +2158,6 @@ static void smack_cred_getlsmprop(const struct cred *cred,
21622158{
21632159 rcu_read_lock ();
21642160 prop -> smack .skp = smk_of_task (smack_cred (cred ));
2165- /* scaffolding */
2166- prop -> scaffold .secid = prop -> smack .skp -> smk_secid ;
21672161 rcu_read_unlock ();
21682162}
21692163
@@ -2265,11 +2259,7 @@ static int smack_task_getsid(struct task_struct *p)
22652259 */
22662260static void smack_current_getlsmprop_subj (struct lsm_prop * prop )
22672261{
2268- struct smack_known * skp = smk_of_current ();
2269-
2270- prop -> smack .skp = skp ;
2271- /* scaffolding */
2272- prop -> scaffold .secid = skp -> smk_secid ;
2262+ prop -> smack .skp = smk_of_current ();
22732263}
22742264
22752265/**
@@ -2282,11 +2272,7 @@ static void smack_current_getlsmprop_subj(struct lsm_prop *prop)
22822272static void smack_task_getlsmprop_obj (struct task_struct * p ,
22832273 struct lsm_prop * prop )
22842274{
2285- struct smack_known * skp = smk_of_task_struct_obj (p );
2286-
2287- prop -> smack .skp = skp ;
2288- /* scaffolding */
2289- prop -> scaffold .secid = skp -> smk_secid ;
2275+ prop -> smack .skp = smk_of_task_struct_obj (p );
22902276}
22912277
22922278/**
@@ -3466,11 +3452,8 @@ static int smack_ipc_permission(struct kern_ipc_perm *ipp, short flag)
34663452static void smack_ipc_getlsmprop (struct kern_ipc_perm * ipp , struct lsm_prop * prop )
34673453{
34683454 struct smack_known * * iskpp = smack_ipc (ipp );
3469- struct smack_known * iskp = * iskpp ;
34703455
3471- prop -> smack .skp = iskp ;
3472- /* scaffolding */
3473- prop -> scaffold .secid = iskp -> smk_secid ;
3456+ prop -> smack .skp = * iskpp ;
34743457}
34753458
34763459/**
@@ -4805,10 +4788,6 @@ static int smack_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op,
48054788 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER )
48064789 return 0 ;
48074790
4808- /* scaffolding */
4809- if (!skp && prop -> scaffold .secid )
4810- skp = smack_from_secid (prop -> scaffold .secid );
4811-
48124791 /*
48134792 * No need to do string comparisons. If a match occurs,
48144793 * both pointers will point to the same smack_known
@@ -4869,10 +4848,6 @@ static int smack_lsmprop_to_secctx(struct lsm_prop *prop, char **secdata,
48694848{
48704849 struct smack_known * skp = prop -> smack .skp ;
48714850
4872- /* scaffolding */
4873- if (!skp && prop -> scaffold .secid )
4874- skp = smack_from_secid (prop -> scaffold .secid );
4875-
48764851 if (secdata )
48774852 * secdata = skp -> smk_known ;
48784853 * seclen = strlen (skp -> smk_known );
0 commit comments